このページのリンク

<電子ブック>
Game Theory for Security and Risk Management : From Theory to Practice / edited by Stefan Rass, Stefan Schauer
(Static & Dynamic Game Theory: Foundations & Applications. ISSN:23638524)

1st ed. 2018.
出版者 (Cham : Springer International Publishing : Imprint: Birkhäuser)
出版年 2018
本文言語 英語
大きさ XXXII, 418 p. 108 illus., 42 illus. in color : online resource
著者標目 Rass, Stefan editor
Schauer, Stefan editor
SpringerLink (Online service)
件 名 LCSH:Game theory
LCSH:Operations research
LCSH:Management science
LCSH:Data protection
FREE:Game Theory
FREE:Operations Research, Management Science
FREE:Data and Information Security
FREE:Operations Research and Decision Theory
一般注記 Part I: Theory -- Utilizing Game Theory for Security Risk Assessment -- Decision Making when Consequences are Random -- Security Strategies and Multi-Criteria Decision Making -- A Scalable Decomposition Method for the Dynamic Defense of Cyber Networks -- Factored Markov Game Theory for Secure Interdependent Infrastructure Networks -- Part II: Practice -- G-DPS: A Game-Theoretical Decision-Making Framework for Physical Surveillance Games -- A Game-Theoretic Framework for Securing Interdependent Assets in Networks -- Random Damage in interconnected Networks -- Optimal Dispatch of Electric Transmission Systems Considering Interdependencies with Natural Gas Systems -- Managing Security Risks Interdependencies between ICT and Electric Infrastructures: A Game-Theoretical Analysis -- Part III: Case Studies -- Security and Interdependency in a Public Cloud: A Game-Theoretic Approach -- A Risk Management Approach for Highly Interconnected Networks -- Protecting Water Utility Networks from Advanced PersistentThreats: A Case Study -- Assessing the Impact of Malware Attacks in Utility Networks -- Game-Theoretic Optimization for Physical Surveillance of Critical Infrastructures: A Case Study -- Smart SECPLAN: A Process Implementation Tool for Hybrid Risk Management
The chapters in this volume explore how various methods from game theory can be utilized to optimize security and risk-management strategies. Emphasizing the importance of connecting theory and practice, they detail the steps involved in selecting, adapting, and analyzing game-theoretic models in security engineering and provide case studies of successful implementations in different application domains. Practitioners who are not experts in game theory and are uncertain about incorporating it into their work will benefit from this resource, as well as researchers in applied mathematics and computer science interested in current developments and future directions. The first part of the book presents the theoretical basics, covering various different game-theoretic models related to and suitable for security engineering. The second part then shows how these models are adopted, implemented, and analyzed. Surveillance systems, interconnected networks, and power grids are among the different application areas discussed. Finally, in the third part, case studies from business and industry of successful applications of game-theoretic models are presented, and the range of applications discussed is expanded to include such areas as cloud computing, Internet of Things, and water utility networks
HTTP:URL=https://doi.org/10.1007/978-3-319-75268-6
目次/あらすじ

所蔵情報を非表示

電子ブック オンライン 電子ブック

Springer eBooks 9783319752686
電子リソース
EB00230668

書誌詳細を非表示

データ種別 電子ブック
分 類 LCC:QA269-272
DC23:519.3
書誌ID 4000120299
ISBN 9783319752686

 類似資料